|
| 1 | +use criterion::{criterion_group, criterion_main, Criterion, PlottingBackend}; |
| 2 | +use std::time::Duration; |
| 3 | + |
| 4 | +use english_numbers::convert_no_fmt; |
| 5 | +use hex_literal::hex; |
| 6 | +use serde::Deserialize; |
| 7 | + |
| 8 | +// Crypto stuff |
| 9 | +use digest::Digest; |
| 10 | +use elliptic_curve::sec1::ToEncodedPoint; |
| 11 | +use k256::ecdsa::SigningKey; // type alias |
| 12 | +use sha2::Sha256; |
| 13 | + |
| 14 | +use cosmwasm_crypto::{ |
| 15 | + ed25519_batch_verify, ed25519_verify, secp256k1_recover_pubkey, secp256k1_verify, |
| 16 | +}; |
| 17 | +use std::cmp::min; |
| 18 | + |
| 19 | +const COSMOS_SECP256K1_MSG_HEX: &str = "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"; |
| 20 | +const COSMOS_SECP256K1_SIGNATURE_HEX: &str = "c9dd20e07464d3a688ff4b710b1fbc027e495e797cfa0b4804da2ed117959227772de059808f765aa29b8f92edf30f4c2c5a438e30d3fe6897daa7141e3ce6f9"; |
| 21 | +const COSMOS_SECP256K1_PUBKEY_BASE64: &str = "A08EGB7ro1ORuFhjOnZcSgwYlpe0DSFjVNUIkNNQxwKQ"; |
| 22 | + |
| 23 | +// TEST 3 test vector from https://tools.ietf.org/html/rfc8032#section-7.1 |
| 24 | +const COSMOS_ED25519_MSG_HEX: &str = "af82"; |
| 25 | +const COSMOS_ED25519_SIGNATURE_HEX: &str = "6291d657deec24024827e69c3abe01a30ce548a284743a445e3680d7db5ac3ac18ff9b538d16f290ae67f760984dc6594a7c15e9716ed28dc027beceea1ec40a"; |
| 26 | +const COSMOS_ED25519_PUBLIC_KEY_HEX: &str = |
| 27 | + "fc51cd8e6218a1a38da47ed00230f0580816ed13ba3303ac5deb911548908025"; |
| 28 | + |
| 29 | +// Test data from https://tools.ietf.org/html/rfc8032#section-7.1 |
| 30 | +const COSMOS_ED25519_TESTS_JSON: &str = "./testdata/ed25519_tests.json"; |
| 31 | + |
| 32 | +#[derive(Deserialize, Debug)] |
| 33 | +struct Encoded { |
| 34 | + #[serde(rename = "privkey")] |
| 35 | + private_key: String, |
| 36 | + #[serde(rename = "pubkey")] |
| 37 | + public_key: String, |
| 38 | + message: String, |
| 39 | + signature: String, |
| 40 | +} |
| 41 | + |
| 42 | +fn read_cosmos_sigs() -> Vec<Encoded> { |
| 43 | + use std::fs::File; |
| 44 | + use std::io::BufReader; |
| 45 | + |
| 46 | + // Open the file in read-only mode with buffer. |
| 47 | + let file = File::open(COSMOS_ED25519_TESTS_JSON).unwrap(); |
| 48 | + let reader = BufReader::new(file); |
| 49 | + |
| 50 | + serde_json::from_reader(reader).unwrap() |
| 51 | +} |
| 52 | + |
| 53 | +fn read_decode_cosmos_sigs() -> (Vec<Vec<u8>>, Vec<Vec<u8>>, Vec<Vec<u8>>) { |
| 54 | + let codes = read_cosmos_sigs(); |
| 55 | + |
| 56 | + let mut messages: Vec<Vec<u8>> = vec![]; |
| 57 | + let mut signatures: Vec<Vec<u8>> = vec![]; |
| 58 | + let mut public_keys: Vec<Vec<u8>> = vec![]; |
| 59 | + |
| 60 | + for encoded in codes { |
| 61 | + let message = hex::decode(&encoded.message).unwrap(); |
| 62 | + messages.push(message); |
| 63 | + |
| 64 | + let signature = hex::decode(&encoded.signature).unwrap(); |
| 65 | + signatures.push(signature); |
| 66 | + |
| 67 | + let public_key = hex::decode(&encoded.public_key).unwrap(); |
| 68 | + public_keys.push(public_key); |
| 69 | + } |
| 70 | + |
| 71 | + (messages, signatures, public_keys) |
| 72 | +} |
| 73 | + |
| 74 | +fn bench_crypto(c: &mut Criterion) { |
| 75 | + let mut group = c.benchmark_group("Crypto"); |
| 76 | + |
| 77 | + group.bench_function("secp256k1_verify", |b| { |
| 78 | + let message = hex::decode(COSMOS_SECP256K1_MSG_HEX).unwrap(); |
| 79 | + let message_hash = Sha256::digest(&message); |
| 80 | + let signature = hex::decode(COSMOS_SECP256K1_SIGNATURE_HEX).unwrap(); |
| 81 | + let public_key = base64::decode(COSMOS_SECP256K1_PUBKEY_BASE64).unwrap(); |
| 82 | + b.iter(|| { |
| 83 | + assert!(secp256k1_verify(&message_hash, &signature, &public_key).unwrap()); |
| 84 | + }); |
| 85 | + }); |
| 86 | + |
| 87 | + group.bench_function("secp256k1_recover_pubkey", |b| { |
| 88 | + let message_hash = |
| 89 | + hex!("82ff40c0a986c6a5cfad4ddf4c3aa6996f1a7837f9c398e17e5de5cbd5a12b28"); |
| 90 | + let private_key = |
| 91 | + hex!("3c9229289a6125f7fdf1885a77bb12c37a8d3b4962d936f7e3084dece32a3ca1"); |
| 92 | + let r_s = hex!("99e71a99cb2270b8cac5254f9e99b6210c6c10224a1579cf389ef88b20a1abe9129ff05af364204442bdb53ab6f18a99ab48acc9326fa689f228040429e3ca66"); |
| 93 | + let recovery_param: u8 = 0; |
| 94 | + |
| 95 | + let expected = SigningKey::from_bytes(&private_key) |
| 96 | + .unwrap() |
| 97 | + .verify_key() |
| 98 | + .to_encoded_point(false) |
| 99 | + .as_bytes() |
| 100 | + .to_vec(); |
| 101 | + |
| 102 | + b.iter(|| { |
| 103 | + let pubkey = secp256k1_recover_pubkey(&message_hash, &r_s, recovery_param).unwrap(); |
| 104 | + assert_eq!(pubkey, expected); |
| 105 | + }); |
| 106 | + }); |
| 107 | + |
| 108 | + group.bench_function("ed25519_verify", |b| { |
| 109 | + let message = hex::decode(COSMOS_ED25519_MSG_HEX).unwrap(); |
| 110 | + let signature = hex::decode(COSMOS_ED25519_SIGNATURE_HEX).unwrap(); |
| 111 | + let public_key = hex::decode(COSMOS_ED25519_PUBLIC_KEY_HEX).unwrap(); |
| 112 | + b.iter(|| { |
| 113 | + assert!(ed25519_verify(&message, &signature, &public_key).unwrap()); |
| 114 | + }); |
| 115 | + }); |
| 116 | + |
| 117 | + // Ed25519 batch verification of different batch lengths |
| 118 | + { |
| 119 | + let (messages, signatures, public_keys) = read_decode_cosmos_sigs(); |
| 120 | + let messages: Vec<&[u8]> = messages.iter().map(|m| m.as_slice()).collect(); |
| 121 | + let signatures: Vec<&[u8]> = signatures.iter().map(|m| m.as_slice()).collect(); |
| 122 | + let public_keys: Vec<&[u8]> = public_keys.iter().map(|m| m.as_slice()).collect(); |
| 123 | + |
| 124 | + for n in (1..=min(messages.len(), 10)).step_by(2) { |
| 125 | + group.bench_function( |
| 126 | + format!("ed25519_batch_verify_{}", convert_no_fmt(n as i64)), |
| 127 | + |b| { |
| 128 | + b.iter(|| { |
| 129 | + assert!(ed25519_batch_verify( |
| 130 | + &messages[..n], |
| 131 | + &signatures[..n], |
| 132 | + &public_keys[..n] |
| 133 | + ) |
| 134 | + .unwrap()); |
| 135 | + }); |
| 136 | + }, |
| 137 | + ); |
| 138 | + } |
| 139 | + } |
| 140 | + |
| 141 | + // Ed25519 batch verification of different batch lengths, with the same pubkey |
| 142 | + { |
| 143 | + //FIXME: Use different messages / signatures |
| 144 | + let messages = [hex::decode(COSMOS_ED25519_MSG_HEX).unwrap()]; |
| 145 | + let signatures = [hex::decode(COSMOS_ED25519_SIGNATURE_HEX).unwrap()]; |
| 146 | + let public_keys = [hex::decode(COSMOS_ED25519_PUBLIC_KEY_HEX).unwrap()]; |
| 147 | + |
| 148 | + let messages: Vec<&[u8]> = messages.iter().map(|m| m.as_slice()).collect(); |
| 149 | + let signatures: Vec<&[u8]> = signatures.iter().map(|m| m.as_slice()).collect(); |
| 150 | + let public_keys: Vec<&[u8]> = public_keys.iter().map(|m| m.as_slice()).collect(); |
| 151 | + |
| 152 | + for n in (1..10).step_by(2) { |
| 153 | + group.bench_function( |
| 154 | + format!( |
| 155 | + "ed25519_batch_verify_one_pubkey_{}", |
| 156 | + convert_no_fmt(n as i64) |
| 157 | + ), |
| 158 | + |b| { |
| 159 | + b.iter(|| { |
| 160 | + assert!(ed25519_batch_verify( |
| 161 | + &messages.repeat(n), |
| 162 | + &signatures.repeat(n), |
| 163 | + &public_keys |
| 164 | + ) |
| 165 | + .unwrap()); |
| 166 | + }); |
| 167 | + }, |
| 168 | + ); |
| 169 | + } |
| 170 | + } |
| 171 | + |
| 172 | + group.finish(); |
| 173 | +} |
| 174 | + |
| 175 | +fn make_config() -> Criterion { |
| 176 | + Criterion::default() |
| 177 | + .plotting_backend(PlottingBackend::Plotters) |
| 178 | + .without_plots() |
| 179 | + .measurement_time(Duration::new(10, 0)) |
| 180 | + .sample_size(12) |
| 181 | +} |
| 182 | + |
| 183 | +criterion_group!( |
| 184 | + name = crypto; |
| 185 | + config = make_config(); |
| 186 | + targets = bench_crypto |
| 187 | +); |
| 188 | +criterion_main!(crypto); |
0 commit comments